(b) Technical assistance and implementation of standards developed
In fulfilling subsection (a) of this section, the Institute is authorized -
- (1) to assist the private sector, upon request, in using and applying the
results of the programs and activities under this section;
- (2) to make recommendations, as appropriate, to the Administrator of General
Services on policies and regulations proposed pursuant to section 759(d) of title 40;
- (3) as requested, to provide to operators of Federal computer systems
technical assistance in implementing the standards and guidelines promulgated pursuant to section 759(d) of title 40;
- (4) to assist, as appropriate, the Office of Personnel Management in
developing regulations pertaining to training, as required by section 5 of the Computer Security Act of 1987;
- (5) to perform research and to conduct studies, as needed, to determine the
nature and extent of the vulnerabilities of, and to devise techniques for the cost-effective security and privacy of sensitive information in Federal computer systems; and
- (6) to coordinate closely with other agencies and offices (including, but not
limited to, the Departments of Defense and Energy, the National Security Agency, the General Accounting Office, the Office of Technology Assessment, and the Office of Management and Budget) -
- (A) to assure maximum use of all existing and planned programs, materials,
studies, and reports relating to computer systems security and privacy, in order to avoid unnecessary and costly duplication of effort; and
- (B) to assure, to the maximum extent feasible, that standards developed
pursuant to subsection (a)(3) and (5) of this section are consistent and compatible with standards and procedures developed for the protection of information in Federal computer systems which is authorized under criteria established by Executive order or an Act of Congress to be kept secret in the interest of national defense or foreign policy.